Sciweavers

16128 search results - page 2821 / 3226
» Distributed network scheduling
Sort
View
ATAL
2003
Springer
15 years 9 months ago
Detecting deception in reputation management
We previously developed a social mechanism for distributed reputation management, in which an agent combines testimonies from several witnesses to determine its ratings of another...
Bin Yu, Munindar P. Singh
123
Voted
CIKM
2003
Springer
15 years 9 months ago
Hierarchical graph indexing
Traffic analysis, in the context of Telecommunications or Internet and Web data, is crucial for large network operations. Data in such networks is often provided as large graphs w...
James Abello, Yannis Kotidis
GI
2003
Springer
15 years 9 months ago
Byzantine Failures and Security: Arbitrary is not (always) Random
: The Byzantine failure model allows arbitrary behavior of a certain fraction of network nodes in a distributed system. It was introduced to model and analyze the effects of very s...
Felix C. Gärtner
HIPC
2003
Springer
15 years 9 months ago
Performance Analysis of Blue Gene/L Using Parallel Discrete Event Simulation
High performance computers currently under construction, such as IBM’s Blue Gene/L, consisting of large numbers (64K) of low cost processing elements with relatively small local...
Ed Upchurch, Paul L. Springer, Maciej Brodowicz, S...
ICSOC
2003
Springer
15 years 9 months ago
Service Oriented Internet
Effective service delivery capabilities are critical to the transformation of the Internet into a viable commercial infrastructure. At the present time, the architecture of the Int...
Jaideep Chandrashekar, Zhi-Li Zhang, Zhenhai Duan,...
« Prev « First page 2821 / 3226 Last » Next »